[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 2/2] libxl_pci: Fix guest shutdown with PCI PT attached



On Thu, Oct 10, 2019 at 06:13:43PM +0200, Sander Eikelenboom wrote:
>On 01/10/2019 12:35, Anthony PERARD wrote:
>> Rewrite of the commit message:
>> 
>> Before the problematic commit, libxl used to ignore error when
>> destroying (force == true) a passthrough device, especially error that
>> happens when dealing with the DM.
>> 
>> Since fae4880c45fe, if the DM failed to detach the pci device within
>> the allowed time, the timed out error raised skip part of
>> pci_remove_*, but also raise the error up to the caller of
>> libxl__device_pci_destroy_all, libxl__destroy_domid, and thus the
>> destruction of the domain fails.
>> 
>> In this patch, if the DM didn't confirmed that the device is removed,
>> we will print a warning and keep going if force=true.  The patch
>> reorder the functions so that pci_remove_timeout() calls
>> pci_remove_detatched() like it's done when DM calls are successful.
>> 
>> We also clean the QMP states and associated timeouts earlier, as soon
>> as they are not needed anymore.
>> 
>> Reported-by: Sander Eikelenboom <linux@xxxxxxxxxxxxxx>
>> Fixes: fae4880c45fe015e567afa223f78bf17a6d98e1b
>> Signed-off-by: Anthony PERARD <anthony.perard@xxxxxxxxxx>
>> 
>
>Hi Anthony / Chao,
>
>I have to come back to this, a bit because perhaps there is an underlying 
>issue.
>While it earlier occurred to me that the VM to which I passed through most 
>pci-devices 
>(8 to be exact) became very slow to shutdown, but I  didn't investigate it 
>further.
>
>But after you commit messages from this patch it kept nagging, so today I did 
>some testing
>and bisecting.
>
>The difference in tear-down time at least from what the IOMMU code logs is 
>quite large:
>
>xen-4.12.0
>       Setup:      7.452 s
>       Tear-down:  7.626 s
>
>xen-unstable-ee7170822f1fc209f33feb47b268bab35541351d
>       Setup:      7.468 s
>       Tear-down: 50.239 s
>
>Bisection turned up:
>       commit c4b1ef0f89aa6a74faa4618ce3efed1de246ec40
>       Author: Chao Gao <chao.gao@xxxxxxxxx>
>       Date:   Fri Jul 19 10:24:08 2019 +0100
>       libxl_qmp: wait for completion of device removal
>
>Which makes me wonder if there is something going wrong in Qemu ?

Hi Sander,

Thanks for your testing and the bisection.

I tried on my machine, the destruction time of a guest with 8 pass-thru
devices increased from 4s to 12s after applied the commit above. In my
understanding, I guess you might get the error message "timed out
waiting for DM to remove...". There might be some issues on your assigned
devices' drivers. You can first unbind the devices with their drivers in
VM and then tear down the VM, and check whether the VM teardown gets
much faster.

Anthony & Wei,

The commit above basically serializes and synchronizes detaching
assigned devices and thus increases VM teardown time significantly if
there are multiple assigned devices. The commit aimed to avoid qemu's
access to PCI configuration space coinciding with the device reset
initiated by xl (which is not desired and is exactly the case which
triggers the assertion in Xen [1]). I personally insist that xl should
wait for DM's completion of device detaching. Otherwise, besides Xen
panic (which can be fixed in another way), in theory, such sudden
unawared device reset might cause a disaster (e.g. data loss for a
storage device).

[1]: https://lists.xenproject.org/archives/html/xen-devel/2019-09/msg03287.html

But considering fast creation and teardown is an important benefit of
virtualization, I am not sure how to deal with the situation. Anyway,
you can make the decision. To fix the regression on VM teardown, we can
revert the commit by removing the timeout logic.

What's your opinion?

Thanks
Chao

>
>--
>Sander
>
>
>
>xen-4.12.0 setup:
>       (XEN) [2019-10-10 09:54:14.846] AMD-Vi: Disable: device id = 0x900, 
> domain = 0, paging mode = 3
>       (XEN) [2019-10-10 09:54:14.846] AMD-Vi: Setup I/O page table: device id 
> = 0x900, type = 0x1, root table = 0x4aa847000, domain = 1, paging mode = 3
>       (XEN) [2019-10-10 09:54:14.846] AMD-Vi: Re-assign 0000:09:00.0 from 
> dom0 to dom1
>       ...
>       (XEN) [2019-10-10 09:54:22.298] AMD-Vi: Disable: device id = 0x907, 
> domain = 0, paging mode = 3
>       (XEN) [2019-10-10 09:54:22.298] AMD-Vi: Setup I/O page table: device id 
> = 0x907, type = 0x1, root table = 0x4aa847000, domain = 1, paging mode = 3
>       (XEN) [2019-10-10 09:54:22.298] AMD-Vi: Re-assign 0000:09:00.7 from 
> dom0 to dom1
>
>
>xen-4.12.0 tear-down:
>       (XEN) [2019-10-10 10:01:11.971] AMD-Vi: Disable: device id = 0x900, 
> domain = 1, paging mode = 3
>       (XEN) [2019-10-10 10:01:11.971] AMD-Vi: Setup I/O page table: device id 
> = 0x900, type = 0x1, root table = 0x53572c000, domain = 0, paging mode = 3
>       (XEN) [2019-10-10 10:01:11.971] AMD-Vi: Re-assign 0000:09:00.0 from 
> dom1 to dom0
>       ...
>       (XEN) [2019-10-10 10:01:19.597] AMD-Vi: Disable: device id = 0x907, 
> domain = 1, paging mode = 3
>       (XEN) [2019-10-10 10:01:19.597] AMD-Vi: Setup I/O page table: device id 
> = 0x907, type = 0x1, root table = 0x53572c000, domain = 0, paging mode = 3
>       (XEN) [2019-10-10 10:01:19.597] AMD-Vi: Re-assign 0000:09:00.7 from 
> dom1 to dom0
>
>xen-unstable-ee7170822f1fc209f33feb47b268bab35541351d setup:
>       (XEN) [2019-10-10 10:21:38.549] d1: bind: m_gsi=47 g_gsi=36 dev=00.00.5 
> intx=0
>       (XEN) [2019-10-10 10:21:38.621] AMD-Vi: Disable: device id = 0x900, 
> domain = 0, paging mode = 3
>       (XEN) [2019-10-10 10:21:38.621] AMD-Vi: Setup I/O page table: device id 
> = 0x900, type = 0x1, root table = 0x4aa83b000, domain = 1, paging mode = 3
>       (XEN) [2019-10-10 10:21:38.621] AMD-Vi: Re-assign 0000:09:00.0 from 
> dom0 to dom1
>       ...
>       (XEN) [2019-10-10 10:21:46.069] d1: bind: m_gsi=46 g_gsi=36 dev=00.01.4 
> intx=3
>       (XEN) [2019-10-10 10:21:46.089] AMD-Vi: Disable: device id = 0x907, 
> domain = 0, paging mode = 3
>       (XEN) [2019-10-10 10:21:46.089] AMD-Vi: Setup I/O page table: device id 
> = 0x907, type = 0x1, root table = 0x4aa83b000, domain = 1, paging mode = 3
>       (XEN) [2019-10-10 10:21:46.089] AMD-Vi: Re-assign 0000:09:00.7 from 
> dom0 to dom1
>
>
>xen-unstable-ee7170822f1fc209f33feb47b268bab35541351d tear-down:
>       (XEN) [2019-10-10 10:23:53.167] AMD-Vi: Disable: device id = 0x900, 
> domain = 1, paging mode = 3
>       (XEN) [2019-10-10 10:23:53.167] AMD-Vi: Setup I/O page table: device id 
> = 0x900, type = 0x1, root table = 0x5240f8000, domain = 0, paging mode = 3
>       (XEN) [2019-10-10 10:23:53.167] AMD-Vi: Re-assign 0000:09:00.0 from 
> dom1 to dom0
>       ...
>       (XEN) [2019-10-10 10:24:43.406] AMD-Vi: Disable: device id = 0x907, 
> domain = 1, paging mode = 3
>       (XEN) [2019-10-10 10:24:43.406] AMD-Vi: Setup I/O page table: device id 
> = 0x907, type = 0x1, root table = 0x5240f8000, domain = 0, paging mode = 3
>       (XEN) [2019-10-10 10:24:43.406] AMD-Vi: Re-assign 0000:09:00.7 from 
> dom1 to dom0

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.